[Cryptography] Sony finding SHA1 collisions?

Peter Todd pete at petertodd.org
Mon Dec 15 02:37:31 EST 2014


On Fri, Dec 12, 2014 at 08:34:02AM -0500, Benjamin Kreuter wrote:
> This article seems to be saying that Sony has been using SHA1 collisions
> to attack BitTorrent:
> 
> http://arstechnica.com/tech-policy/2014/12/sony-fights-spread-of-stolen-data-by-using-bad-seed-attack-on-torrents/?q=1
> 
> Does anyone know if that is what Sony is actually doing?  I cannot seem
> to find more details after ~5 minutes of Googling.

There's a 2.474BTC reward outstanding for anyone who has a
SHA1 hash collision: 37k7toV1Nv4DfmQbmZ8KuZDQCYK9x5KpzP

$ btc decodescript 6e879169a77ca787
{
    "asm" : "OP_2DUP OP_EQUAL OP_NOT OP_VERIFY OP_SHA1 OP_SWAP OP_SHA1 OP_EQUAL",
    "type" : "nonstandard",
    "p2sh" : "37k7toV1Nv4DfmQbmZ8KuZDQCYK9x5KpzP"
}

Note that due to limitations in the Bitcoin scripting system both
messages to be hashed have to fit within 520 bytes.

More details here: https://bitcointalk.org/index.php?topic=293382.0

-- 
'peter'[:-1]@petertodd.org
00000000000000000681f4e5c84bc0bf7e6c5db8673eef225da652fbb785a0de
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 650 bytes
Desc: Digital signature
URL: <http://www.metzdowd.com/pipermail/cryptography/attachments/20141215/f123dd95/attachment.sig>


More information about the cryptography mailing list